Abstract
This paper summarizes the ten-year development of virtualization-based copy protection by the TrulyProtect team. We survey the approaches used, the special problems in various operating systems and software types, and some research directions that have not been covered.
| Original language | English |
|---|---|
| Pages (from-to) | 353-366 |
| Number of pages | 14 |
| Journal | Computational Methods in Applied Sciences |
| Volume | 56 |
| DOIs | |
| State | Published - 2022 |
| Externally published | Yes |
Keywords
- Reverse engineering
- Virtualization